Day One

08:15
Registration and welcome coffee
08:50
Opening remarks from the chair

 

Lani Refiti 
Co-founder and Chief Executive Officer 
IoTSec Australia

UNDERSTANDING YOUR THREAT LANDSCAPE
9:00
Understanding the changing threat landscape
  • Looking at how cyber warfare is changing
  • Drawing on lessons from the US Government election
  • Tactics and techniques for attacking

Damien Manuel
Cyber Security Research and Innovation Centre (CSRI)
Deakin University

09:30
GATHERING AND RESPONDING TO THREAT INTELLIGENCE AND THE LAW
  • What the law says about threat intelligence
  • Applicable international and Australian law
  • Know your rights
Helaine Leggat
Director
Australian Information Security Association (AISA) & Information Legal Pty Ltd

 
10:00
Zero Trust Security: What it is and why you need it
  • Cyber security paradigm shift – traditional vs cloud perimeter
  • Zero trust concept
  • Case studies, see Zero Trust in action    

Fernando Serto
Head of Security Technology and Strategy
Akamai Technologies

 
10:30
Morning tea and showcase viewing
OPERATIONALISING THREAT INTELLIGENCE
11:10
Integrating threat intelligence
  • Establishing a security operations centre with an integrated intel team
  • How CTI makes for a better, quicker response
  • Value in a more holistic approach from internal and external sources of information
  • The pros and cons of the push to the cloud

Fred Thiele
Chief Information Security Officer 
Velocity Frequent Flyer

11:40
Security and Intelligence Automation and Orchestration
  • Evaluating the implications of limited security budgets, resources and skills
  • Reducing risk and improving productivity through security and intelligence automation
  • Maximising the ROI of your cyber security strategy
     

Ty Miller
Director
Threat Intelligence

 

12:10
SOLUTION SPOT LIGHT: IMPROVING INCIDENT RESPONSE AND BREACH READINESS WITH AUTOMATION AND PLAYBOOKS

Graham Harvey
Regional Sales Engineer
Carbon Black

 

12:30
Networking lunch and showcase viewing
MONITORING AND REPORTING INCIDENTS
13:30
How real-time intelligence can help organisations prevent and contain the impact of cyber attacks
  • Rapidly and effectively translating large volumes of threat information into intelligence to help detect threats and protect the business
  • How this relates to critical infrastructure
  • Case Study looking at what Horizon has deployed in its environment
     

Jeff Campbell
Manager Technology
Horizon Power

14:00
Getting the right balance with Endpoint protection
  • Considering the value of Endpoint protection
  • Understanding the capabilities of different solutions
  • Determining want vs need and aligning solutions to meet that need
     

Lidia Giuliano
Information security specialist

14:30
SOLUTION SPOT LIGHT: SECURING THE MODERN ENTERPRISE WITH A MODERN APPROACH

Fernando Serto
Head of Security Technology and Strategy
Akamai Technologies

14:45
Afternoon tea and showcase viewing
15:20
Using AI to defend against “unknown unknowns”
  • Identifying how machine learning can report on anomalies and countering malicious activity in real time
  • Illustrating how AI can be used to protect organisations against ‘unknown unknowns’
  • Discussing world case studies in FSI, government and manufacturing that have opted innovative ways to protect their business from reputational loss

Jasper Chik
Pre-Sales Manager ANZ & ASEAN
Infoblox

BUILDING CAPACITY THROUGH MAN AND MACHINE
15:50
Building cybersecurity capacity through Machine Learning
  • Can machine learning be cybersecurity's answer to detecting breaches in advance?
  • How do we apply machine learning to cybersecurity problems?

Prof. Jill Slay
Director of Cyber Resilience Initiatives
Australian Computer Society

16:20
Fireside chat: Disruptive technology supporting cyber security – the good, bad and the ugly
  • AI and ML - risk or opportunity?
  • Perspectives on why consider emerging technologies and why not
  • Lessons from the integration of emerging technologies
     

Priya George
Chief Executive Officer 
NIMIS Cybersecurity

Chris Monk
Head of Region (APAC)
Decoded

17:00
Closing remarks from the chair
17:10
End of Day One and networking drinks